Source: golang-github-pion-dtls-v3
Version: 3.0.7-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Control: clone -1 -2
Control: reassign -2 src:golang-github-pion-dtls.v2 2.2.6-1
Control: retitle -2 golang-github-pion-dtls.v2: CVE-2026-26014

Hi,

The following vulnerability was published for golang-github-pion-dtls*.

CVE-2026-26014[0]:
| Pion DTLS is a Go implementation of Datagram Transport Layer
| Security. Pion DTLS versions v1.0.0 through v3.0.10 and 3.1.0 use
| random nonce generation with AES GCM ciphers, which makes it easier
| for remote attackers to obtain the authentication key and spoof data
| by leveraging the reuse of a nonce in a session and a "forbidden
| attack". Upgrade to v3.0.11, v3.1.1, or later.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-26014
    https://www.cve.org/CVERecord?id=CVE-2026-26014
[1] https://github.com/pion/dtls/security/advisories/GHSA-9f3f-wv7r-qc8r

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to